Search Results - (( terms detection method algorithm ) OR ( java application based algorithm ))
Search alternatives:
- application based »
- method algorithm »
- java application »
- terms detection »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
5
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
6
Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.]
Published 2020“…The experimental results showed that the proposed algorithms could be practical in terms of effectively detecting road lines and generate lane detection…”
Get full text
Get full text
Get full text
Article -
7
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
8
Vertical-edge-based car-license-plate detection method
Published 2013“…The first contribution is that we propose a fast vertical edge detection algorithm (VEDA) based on the contrast between the grayscale values, which enhances the speed of the CLPD method. …”
Get full text
Get full text
Get full text
Article -
9
Weighting method for modal parameter based damage detection algorithms
Published 2011“…Normally, there is a variance in the sensitivity of different modes and the global stiffness change is derived by taking the algebraic average, which is equivalent to the mean in statistical analysis terms. This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
10
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…Therefore, a better algorithm is desired to improve the detection performance in terms of time and accuracy. …”
Get full text
Get full text
Monograph -
11
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
An adept edge detection algorithm for human knee osteoarthritis images
Published 2023“…In this paper, Sobel edge detection operator and its enhanced algorithm are first discussed in terms of optimal thresholding in C language under Linux platform. …”
Conference Paper -
13
-
14
-
15
Investigating the performance of an amplitude-independent algorithm for detecting the hand muscle activity of stroke survivors
Published 2020“…The results showed that the amplitude-independent algorithm performed better in terms of detecting weak muscle activity and resisting false alarms.…”
Get full text
Get full text
Get full text
Article -
16
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The findings reveal which method performed better in terms of accuracy and running time.…”
Get full text
Get full text
Get full text
Article -
17
-
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…Analysis of moving object detection methods is presented in this paper, includes Artificial Neural Network (ANN) and Viola-Jones algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item
